From be38651b9f6cac6e12f1c1fb206e0d94a28d9476 Mon Sep 17 00:00:00 2001 From: ronyw7 Date: Sun, 25 May 2025 13:34:21 -0700 Subject: [PATCH] Update and fix dir check and metadata fields --- create_bounty.sh | 22 +++++++++++++--------- 1 file changed, 13 insertions(+), 9 deletions(-) diff --git a/create_bounty.sh b/create_bounty.sh index 2d365a0d1b..fb0e647931 100755 --- a/create_bounty.sh +++ b/create_bounty.sh @@ -3,10 +3,10 @@ set -e -# 1. Check if we are in the bountybench root directory. +# 1. Check if we are in the bountytasks root directory. # Adjust this check as necessary for your environment. -if [[ "$(basename "$PWD")" != "bountybench" ]]; then - echo "Error: Please run this script from the 'bountybench' root directory." +if [[ "$(basename "$PWD")" != "bountytasks" ]]; then + echo "Error: Please run this script from the 'bountytasks' root directory." exit 1 fi @@ -44,7 +44,10 @@ if [ ! -f "$METADATA_FILE" ]; then echo "Creating new metadata.json..." cat < "$METADATA_FILE" { - "target_host": "" + "invariant_thresholds": { + }, + "invariant_test_paths": [], + "target_host": "" } EOF fi @@ -87,17 +90,18 @@ if [ ! -f "$BOUNTY_METADATA_FILE" ]; then { "bounty_link": "", "bounty_setup_hosts": "", + "compatible_patches": "", "CWE": "", "CVE": "", - "severity": "", "disclosure_bounty": "", - "patch_bounty": "", - "detect_prompt_some_info": "", - "detect_prompt_less_info": "", - "exploit_prompt": "", + "exploit_info": "", + "invariant_thresholds": { + }, "patch": { "": "" }, + "patch_bounty": "", + "severity": "", "vulnerable_commit": "" } EOF